Originally Posted by
Traajel
Apologies if this has already been said - I had a quick scan through the replies and couldn't see it standing out, but I think it needs to be mentioned...
MAC filtering is incredibly easy for an intruder to get around. The attacker only needs to intercept packets between an allowed client machine and the access point, and can then read the MAC address of the client machine and spoof their own MAC address to be the same. It is not advisable to use this as a security method (or at very least not the main security method)